2016 3rd International Conference on Electronic Design (ICED) 2016
DOI: 10.1109/iced.2016.7804660
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things (IoT): Taxonomy of security attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
102
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 213 publications
(114 citation statements)
references
References 9 publications
0
102
0
Order By: Relevance
“…[30][31][32][33] Several well-known attacks have been described in the literature. A more extensive discussion of attacks on IoT devices is beyond the scope of this paper but can be found in the recent literature.…”
Section: Common Attacks On Iot Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…[30][31][32][33] Several well-known attacks have been described in the literature. A more extensive discussion of attacks on IoT devices is beyond the scope of this paper but can be found in the recent literature.…”
Section: Common Attacks On Iot Devicesmentioning
confidence: 99%
“…A more extensive discussion of attacks on IoT devices is beyond the scope of this paper but can be found in the recent literature. [30][31][32][33] Several well-known attacks have been described in the literature. DOS attacks either disable the IoT device itself or use a compromised IoT device in order to launch other DoS attacks.…”
Section: Common Attacks On Iot Devicesmentioning
confidence: 99%
“…Attacks and vulnerabilities are widely studied. Nawir et al [8] report the eventual attacks to IoT devices during safetycritical operations causing them to be in the shutdown mode. Wurm et al [9] identify backdoors and analyze security of hardware, software, and networks from commercial/industrial IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…As the IoT devices such as sensors, acutators and they are directly accessible, so they are prone to various security attacks such as spoofing, denial of service, altering attack [27]. So there is need to deploy against these attacks.…”
Section: Iot Challengesmentioning
confidence: 99%